Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Hedra, the app used to make talking baby podcasts, raises $32M from a16z

May 15, 2025

Russia grabs a bit more of Ukraine as it heads into peace talks | Russia-Ukraine war News

May 15, 2025

Canadian Electric Utility Lists Customer Information Stolen by Hackers

May 15, 2025
Facebook X (Twitter) Instagram
Trending
  • Hedra, the app used to make talking baby podcasts, raises $32M from a16z
  • Russia grabs a bit more of Ukraine as it heads into peace talks | Russia-Ukraine war News
  • Canadian Electric Utility Lists Customer Information Stolen by Hackers
  • Monzo launches Undo Payments tool to boost safety for digital bank transfers
  • Why Flagright is transforming compliance through AI
  • Australian Human Rights Commission Discloses Data Breach
  • Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’
  • Harvey reportedly in discussions to raise $250M at $5B valuation
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Thursday, May 15
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Veeam Patches Critical Vulnerability in Backup & Replication
Cybersecurity

Veeam Patches Critical Vulnerability in Backup & Replication

adminBy adminMarch 20, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 58


Backup, recovery, and data protection firm Veeam on Wednesday announced patches for a critical-severity vulnerability in its Backup & Replication product that could allow attackers to execute arbitrary code remotely.

In a scarce advisory, Veeam notes that the security defect, tracked as CVE-2025-23120 (CVSS score of 9.9), could allow for “remote code execution (RCE) by authenticated domain users”, and that Backup & Replication version 12.3.0.310 and previous version 12 builds are affected.

The company recommends updating to Backup & Replication version 12.3.1 (build 12.3.1.1139), which includes patches for the flaw.

According to cybersecurity firm watchTowr, which was credited for reporting the vulnerability, CVE-2025-23120 is rooted in a broader issue within Veeam’s deserialization mechanism, which the company has failed to properly address.

Veeam Backup & Replication, watchTowr says, follows the industry standard of controlling which classes can be deserialized, by implementing an allow-list, but also fails to implement proper deserialization procedures, as one of the allowed classes leads to inner deserialization, which implements a block-list instead.

Veeam’s patches for previously reported deserialization flaws involved adding entries to the block-list, and, due to this configuration and Backup & Replication’s large codebase, new deserialization gadgets that can be exploited to achieve code execution can still be found, watchTowr says.

CVE-2025-23120, the cybersecurity firm explains, can be linked to CVE-2024-40711, a critical-severity RCE flaw disclosed in September 2024 and exploited in ransomware attacks less than a month later.

It can also be linked to CVE-2024-42455, a high-severity bug allowing “an authenticated user with a role assigned in the Users and Roles settings on the backup server to connect to remote services and exploit insecure deserialization by sending a serialized temporary file collection, thereby enabling the deletion of any file on the system with service account privileges”.

Advertisement. Scroll to continue reading.

Essentially, watchTowr says, an attacker can identify this type of issues in Backup & Replication by searching the product’s codebase for deserialization gadgets that are not block-listed, and which could have a malicious impact.

The cybersecurity firm itself identified two such issues (collectively tracked as CVE-2025-23120), including one that can be exploited by modifying proof-of-concept (PoC) code targeting CVE-2024-40711.

watchTowr also warns that, while the exploitation of the new vulnerability requires for the attacker to be logged in, “the authentication requirement is fairly weak.”

Related: Veeam Warns of Critical Vulnerability in Service Provider Console

Related: Veeam Patches High-Severity Vulnerability as Exploitation of Previous Flaw Expands

Related: Year-Old Veeam Vulnerability Exploited in Fresh Ransomware Attacks

Related: Critical Veeam Vulnerability Leads to Authentication Bypass



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

Canadian Electric Utility Lists Customer Information Stolen by Hackers

May 15, 2025

Australian Human Rights Commission Discloses Data Breach

May 15, 2025

Chrome 136 Update Patches Vulnerability With ‘Exploit in the Wild’

May 15, 2025

Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware

May 14, 2025

Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks

May 14, 2025

Kosovar Administrator of Cybercrime Marketplace Extradited to US

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Here’s How Much Selena Gomez-Actress, Singer, Entrepreneur-Is Worth

May 13, 2025

Contrary to reports of her 10-figure status, Forbes estimates the Disney star turned business mogul’s…

Looking Back At Trump’s Years-Long Obsession With Oversized Airplanes

May 13, 2025

Selena Gomez’s Mental Health Startup Wondermind Lays Off Nearly Two-Thirds Of Its Employees

May 13, 2025

Billionaires And CEOs Are Seeking Personal Security At Record Rates

May 9, 2025
Our Picks

Hedra, the app used to make talking baby podcasts, raises $32M from a16z

May 15, 2025

Russia grabs a bit more of Ukraine as it heads into peace talks | Russia-Ukraine war News

May 15, 2025

Canadian Electric Utility Lists Customer Information Stolen by Hackers

May 15, 2025

Monzo launches Undo Payments tool to boost safety for digital bank transfers

May 15, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

Hedra, the app used to make talking baby podcasts, raises $32M from a16z

May 15, 2025

Harvey reportedly in discussions to raise $250M at $5B valuation

May 15, 2025

Grok is unpromptedly telling X users about South African ‘white genocide’

May 14, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.